noserviceOur cell phones are capable of carrying out orders that we do not ask of them. Siri regularly helps out by answering our direct questions, but these miniature computers are constantly interacting with the environment around us. The information gained through location, user role, past purchases, Facebook likes and more is regularly being tabulated and our devices may be acting without our permission.

There is a theory out there that Dzhokhar Tsarnaev used a cell phone after placing one of the knapsacks on the ground at the Boston Marathon site and that this cell phone may have acted as a detonator for the explosion.

With that in mind, a theory that cell service was blocked out or jammed in that area also started. This was later denied by cell service providers who blamed the lack of service due to an overload from the huge number of people and sudden need for communication after the blasts. The action of shutting down cell phone networks to prevent remote detonation is a common tactic in places outside of the United States such as Pakistan.

My intent is not to frighten but to remind that these devices we bring into our enterprises and allowing onto our networks are complex and smart machines. With the BYOD phenomenon, it is challenging to control the unknown. Homeland Security starts with you.